Home

Description

DevGuard provides vulnerability management for the full software supply chain. Prior to 1.2.2, the SessionMiddleware accepts a client-supplied X-Admin-Token HTTP request header and uses its raw string value as the authenticated userID when no Kratos session cookie is present. An unauthenticated attacker who knows or can guess a target user's Kratos identity UUID can issue requests as that user. Where the target user is an organisation admin or owner, this gives the attacker full control over that organisation's DevGuard resources. This vulnerability is fixed in 1.2.2.

PUBLISHED Reserved 2026-04-26 | Published 2026-05-12 | Updated 2026-05-13 | Assigner GitHub_M




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-288: Authentication Bypass Using an Alternate Path or Channel

Product status

< 1.2.2
affected

References

github.com/...vguard/security/advisories/GHSA-2g9v-7mr5-fgjg

github.com/...ommit/6f38310bf93b2a63df3055038f4da82b1f4e6d9a

cve.org (CVE-2026-42300)

nvd.nist.gov (CVE-2026-42300)

Download JSON